Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 12:31

General

  • Target

    bbbc578789b1e3ddab23e533c3470e46_JaffaCakes118.exe

  • Size

    42KB

  • MD5

    bbbc578789b1e3ddab23e533c3470e46

  • SHA1

    5d3fa2022adddd5d449b602380c5ddabae6b0d69

  • SHA256

    341eb5ee174a3beb6fbe971762178dc5bc90aad05ee80af94e3bfe59d4f42205

  • SHA512

    eddd169cf573cf5b2c52df053a3cc36a302324048f059774cdca20dad2d1563d5f95e9904f97786136caf109d72e5a274b0edcdad35d3b4cd0176320f02c298e

  • SSDEEP

    768:CxpaZDTHJCO6l+TtAsUuc+8JZQUf/lFv9cxTyOAQJIngo:C4DTH+MpJc+8JhXlR9ceq3o

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3476
      • C:\Users\Admin\AppData\Local\Temp\bbbc578789b1e3ddab23e533c3470e46_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\bbbc578789b1e3ddab23e533c3470e46_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4116
        • C:\Users\Admin\AppData\Local\Temp\bbbc578789b1e3ddab23e533c3470e46_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\bbbc578789b1e3ddab23e533c3470e46_JaffaCakes118.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4000
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4512,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4500 /prefetch:8
      1⤵
        PID:4336

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3476-5-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

        Filesize

        28KB

      • memory/3476-6-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

        Filesize

        4KB

      • memory/4000-0-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/4000-2-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/4000-3-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB

      • memory/4000-4-0x0000000000400000-0x0000000000409000-memory.dmp

        Filesize

        36KB